Short, WA

Abigail Elisabeth Short, Redmond, WA US

Patent application number

Description

Published

20090182710

Calculating and Storing Data Structures - Embodiments are provided to calculate and provide information based in part on a defined expression. In an embodiment, a database system can be configured to include a number of calculated columns as part of a database table structure. The database system can be configured to present a calculated result based in part on a determined result type. In one embodiment, a database system can be configured to enable calculated columns to be defined on a table of a database, wherein a component can be used to evaluate an expression associated with a column calculation to determine a proper result type. The proper result type can be stored and used when presenting a result of the calculation. Other embodiments are available.

07-16-2009

Bryan Short, Seattle, WA US

Patent application number

Description

Published

20090282095

DYNAMIC POSTBACK FOR LOCATION CODE EXECUTION - Architecture that introduces evaluation and decisionmaking (e.g., at the server) and allows a runtime decision to be made, on a per-request basis, as to where the data calculations will occur, on the server, on the client, or as a shared execution on both the server and the client. The decision can be made based on environment variables (e.g., permissions, network bandwidth, server load, etc.) of the user, for example. This approach provides performance tuning of a form by dynamically optimizing the location of execution of the code based on environment factors.

11-12-2009

Jason Edward Short, Bellevue, WA US

Patent application number

Description

Published

20140123078

MOBILE COMMUNICATIONS DEVICE, NON-TRANSITORY COMPUTER-READABLE MEDIUM AND METHOD OF SWITCHING SCREEN OF MOBILE COMMUNICATIONS DEVICE FROM SCREEN LOCKED STATE TO SCREEN UNLOCKED STATE - A method of switching a screen of a mobile communications device from a screen locked state to a screen unlocked state is provided. The mobile communications device includes a display panel configured to display the screen that has a background section and a first section in the screen locked state. The method includes: moving the first section from a first location to a second location of the screen in the screen locked state when an screen unlocking requirement is determined to be satisfied; and keeping displaying the first section at the second location of the screen after switching the screen from the screen locked state to the screen unlocked state. A non-transitory computer-readable medium and a mobile communications device for switching a screen of the mobile communications device from a screen locked state to a screen unlocked state are also provided.

05-01-2014

Keith W. Short, Redmond, WA US

Patent application number

Description

Published

20080201355

EASILY QUERIABLE SOFTWARE REPOSITORIES - In one embodiment, tables are created in such a way that allows rich querying using standard database routines and other tools. This is accomplished by providing developers and repository users with a set of schema guidelines that describe how the software related items are to be categorized in the tables and how to use such tables for rich querying. For example, one such guideline provides for course-grained versioning of items (e.g., artifacts, metadata, etc.)—as opposed to the fine grained object principle of unit change found in most repository systems such as the entity-property-value scheme. The developers or providers then use these guidelines to optimally categorize, in a natural way, their metadata and other software related items for storing copies thereof in the repository.

08-21-2008

20090222751

MODELING CONFIGURATIONS OF SYSTEMS - One embodiment may be practiced in a computing environment and includes method acts for creating a new component model from an existing component model. The method includes accessing an existing component definition. The existing component definition is included in an existing component schema, which includes definitions of configuration parameters defined for the existing component including defining that one or more parameters are further configurable. Definitions of the one or more parameters that are defined as being further configurable are refined. The refined definitions for the one or more parameter values are stored in a refined schema defining refinements of the component definition, without including the existing component schema. The refined schema is stored separately from the existing component schema.

09-03-2009

20100114984

MODELING PARTY IDENTITIES IN COMPUTER STORAGE SYSTEMS - The present invention extends to methods, systems, and computer program products for modeling party identities in computer storage systems. A federated identity fabric models identity data and relationships between portions of indentify data in computer storage systems in accordance with a uniform schema. The federated identity fabric can federate distributed identity and identity relationship data from computer storage systems within the variety of different computing environments. Code and metadata at computing environments associated with the federated identity fabric can interoperate to facilitate uniformly storing, accessing, modifying, deleting, and securing identity and identity relationship data within the federated identify fabric. Embodiments of the invention include utilizing an identity key table entry to locate party identity information and performing key transformations between different types of identity keys.

05-06-2010

20100332548

DATABASES FROM MODELS - One or more model elements may be extracted from a model. Coding patterns may be generated based on the extracted model elements. The coding patterns may be translated into statements, such as Structured Query Language (SQL) statements, which may be executed to instantiate at least a portion of a database. The database may be used to store, edit and/or query data that is arranged according to the model. The model may define a modeling language specification, such that the stored data may define various models that comply with the modeling language specification. Accordingly, the database may be queried to analyze the contents of the modeling-language compliant models.

12-30-2010

20110106853

DECLARATIVE MODEL SECURITY PATTERN - The present invention extends to methods, systems, and computer program products for a declarative model security pattern for use in a database. Declarative language code can include a declared access control predicate and a separately declared data structure definition bound to the access control predicate. A portion of the database is instantiated from the declarative language code. The instantiated portion of the database includes one or more tables and a view of the one or more tables. A database management system enforces the access control predicate by dynamically calculating a value for the access control predicate and using the dynamically calculated value to define what operations may be performed on data in the one or more tables via the view.

05-05-2011

20120166443

EASILY QUERIABLE SOFTWARE REPOSITORIES - Tables are created in such a way that allows rich querying using standard database routines and other tools. Developers and repository users are provided with a set of schema guidelines that describe how the software related items are to be categorized in the tables and how to use such tables for rich querying. For example, one such guideline provides for course-grained versioning of items (e.g., artifacts, metadata, etc.)—as opposed to the fine grained object principle of unit change found in most repository systems such as the entity-property-value scheme. The developers or providers then use these guidelines to optimally categorize, in a natural way, their metadata and other software related items for storing copies thereof in the repository.

06-28-2012

Patent applications by Keith W. Short, Redmond, WA US

K. Michiko Short, Renton, WA US

Patent application number

Description

Published

20120131661

BACK-END CONSTRAINED DELEGATION MODEL - A client can communicate with a middle tier, which can then, in turn, communicate with a back end tier to access information and resources on behalf of the client within the context of a system that can scale well. Each individual back end can establish a policy that defines which computing device can delegate to that back end. That policy can be enforced by a domain controller within the same administrative domain as the particular back end. When a middle tier requests to delegate to a back end, the domain controller to which that request was directed can either apply the policy, or, if the domain controller is in a different domain than the targeted back end, it can direct the middle tier to a domain controller in a different domain and can sign relevant information that the middle tier can utilize when communicating with that different domain controller.

05-24-2012

20130061299

DISTRIBUTED COMPUTER SYSTEMS WITH TIME-DEPENDENT CREDENTIALS - A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.

03-07-2013

20130061300

DISTRIBUTED COMPUTER SYSTEMS WITH TIME-DEPENDENT CREDENTIALS - A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.

03-07-2013

20130061301

DISTRIBUTED COMPUTER SYSTEMS WITH TIME-DEPENDENT CREDENTIALS - A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.

03-07-2013

Luke C. Short, West Richland, WA US

Patent application number

Description

Published

20120248301

UV-LED IONIZATION SOURCE AND PROCESS FOR LOW ENERGY PHOTOEMISSION IONIZATION - A UV-LED photoemission ionization source and process are disclosed that provide ionization of analytes including volatile molecular species and organic residues for detection with various ion analyzers. The UV-LED source produces low-energy UV light (200 nm to 400 nm) that yields photoemission electrons from various conducting surfaces. These photoemission electrons provide direct and indirect ionization of analytes including trace organic residues without need of high electric fields.

10-04-2012

Mark Short, Redmond, WA US

Patent application number

Description

Published

20090106075

METHODS AND APPARATUS FOR ESTIMATION OF PROJECT SCHEDULES - One embodiment of the invention is directed to automatically extending a task in a project schedule. If certain information items associated with a task are not specified, the scheduled completion time for a task may be automatically extended under the assumption that if these information items are unknown, the task will take longer to complete than originally planned. The project schedule, incorporating the automatically extended tasks, may then be displayed.